Welcome![Sign In][Sign Up]
Location:
Search - security matlab

Search list

[OtherA101

Description:
Platform: | Size: 1024 | Author: 张张 | Hits:

[matlab802.11Security

Description: Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.-Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in Theor y and practice of wireless security, dispelling some of the myths along the way. In do ing so, they provide you with the technical grounding r equired to think about how the rest of the book ap plies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--ba sed systems. you ll want this book beside you every step of the way.
Platform: | Size: 835584 | Author: | Hits:

[Special EffectsArnoldMatlabcode123

Description: 用于图像置乱处理,在信息传输过程中可以保证图像的安全性。-scrambling for image processing and transmission of information in the course of the image can guarantee security.
Platform: | Size: 1024 | Author: jiweiapple | Hits:

[Special Effectsait_picmatch

Description: Author: Fahd Ahmad Abbasi Summary: Matches two pictures given as arguments. MATLAB Release: R13 Required Products: Image Processing Toolbox Description: The function takes two images as argument and using edge detection checks whether they are the same or not...a cool and simple code which can be used in security systems. The level at which the two pictures should be matched can be controlled. -Author : Fahd Ahmad Abbasi Summary : Matches two pictures given as arguments. MATLAB B. Release : R13 Required Products : Image Processing Toolbox Description : The function takes two images as argument and us ing edge detection checks whether they are the s ame or not ... a cool and simple code which can be u sed in security systems. The level at which the t wo pictures should be matched can be controlled .
Platform: | Size: 1024 | Author: Jallon | Hits:

[Special Effectsharisuciciwatermark

Description: 于内容的图像认证技术是一种新颖的图像信息安全技术,用来验证数字图像内容的完整性与真实 性。本文介绍了基于内容的图像认证技术的分类、发展历史和研究现状,并针对其现有算法的缺陷,对未来的发 展趋势和应用进行了展望。 -content in the image authentication technology is a novel image information security technology, used to verify digital image content authenticity and integrity. This paper introduces the content-based image authentication techniques classification, history and current status of research and against its existing algorithm, the future trends and applications of Outlook.
Platform: | Size: 758784 | Author: cici | Hits:

[transportation applicationsvb

Description: VB串口编程调试精灵 智能安防报警系统 电子警察拍照管理系统 云台镜头控制系统 电机驱动监控系统 远程水文监测系统 串口实现双机互联-VB serial debug programming wizard intelligent electronic security alarm system for the police to take photographs management system Yuntai lens motor drive control system for remote monitoring system of hydrological monitoring system to achieve double serial interconnect
Platform: | Size: 4849664 | Author: 丁杰 | Hits:

[Speech/Voice recognition/combineSpeech_signal_short_time_analysis

Description: 语音信号的短时分析,主要包括:分帧、短时能量、短时平均幅度、短时过零率、短时自相关函数、短时幅度差、倒谱、复倒谱、lpc系数、lpc谱估计等 绝对保证质量,是保研后导师布置的一些基础程序-Short-time speech signal analysis, mainly including: sub-frame, short-time energy, short-term average, short-time zero-crossing rate, short-time auto-correlation function, short-term rate of poor cepstrum, complex cepstrum, lpc coefficients, lpc spectral estimation, such as an absolute guarantee that the quality of instructors is the security arrangement after the inquest some of the basis of procedures
Platform: | Size: 6144 | Author: 云鹏 | Hits:

[Special Effectsshuiyinqianru

Description: 数字水印的嵌入 音频文件的嵌入,音频防伪-Embedded digital watermark embedding audio files, audio, security
Platform: | Size: 1024 | Author: 无字 | Hits:

[matlabAvailability

Description: To Calculate QOS and how it affects Security
Platform: | Size: 1024 | Author: Manikanda Raj S | Hits:

[Special EffectsEigenface

Description: 人脸识别具有广泛的应用前景,诸如公安系统的罪犯身份识别,驾驶执照及护照与实际持证人的核对、行及海关的监控系统及自动门卫系统等-Face recognition has wide application prospects, such as the Public Security system offender identification, driving license and passport and the actual holder of the check, the Customs and surveillance system and automatic gate systems, etc.
Platform: | Size: 11264 | Author: fengyu | Hits:

[Crack HackSDES

Description: This program applies Simplified DES (S-DES) Ciphering Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material
Platform: | Size: 2048 | Author: Maimouna | Hits:

[Crack HackRSA

Description: This program applies Message Digest MD5 Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material
Platform: | Size: 15360 | Author: Maimouna | Hits:

[Crack HackMD5

Description: This program applies Message Digest (MD5) Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material -This program applies Message Digest (MD5) Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material
Platform: | Size: 6144 | Author: Maimouna | Hits:

[DocumentsFacerecognition

Description: 人脸识别因其在安全验证系统、信用卡验证、医学、档案管理、视频会 议、人机交互、系统公安(罪犯识别等)等方面的巨大应用前景而越来越成为 当前模式识别和人工智能领域的一个研究热点。 本文提出了基于24位彩色图像对人脸进行识别的方法,介绍的主要内容是图像处理,它在整个软件中占有极其重要的地位,图像处理的好坏直接影响着定位和识别的准确率。本软件主要用到的图像处理技术是:光线补偿、高斯平滑和二值化。在识别前,先对图像进行补光处理,再通过肤色获得可能的脸部区域,最后根据人脸固有眼睛的对称性来确定是否就是人脸,同时采用高斯平滑来消除图像的噪声,再进行二值化,二值化主要采用局域取阈值方法,接下来就进行定位、提取特征值和识别等操作。经过测试,图像预处理模块对图像的处理达到了较好的效果,提高了定位和识别的正确率- Face recognition is a complex and difficult problem that is important for surveillance and security, telecommunications, digital libraries , video meeting, and human-computer intelligent interactions. The paper introduced the method of face recognition that based on the 24 bit multicolor image, Main content that the paper introduced is the picture treatment, It occupies the extremely important position in the whole software, the quality of picture process directly influenced the accuracy rate of localization and discerning. The picture process technology that the software mainly used included : light compensating、gauss smooth and twain value method. before discerning, we compensated the light for image, then we could obtain the possible face area through the complexion, finally, the system could depend on the symmetry of eyes to make sure whether it is the face of people, at the same time, the system could eliminate noises through the method that named gauss smoothness, then we use
Platform: | Size: 2286592 | Author: 张雨 | Hits:

[GUI Developproject_code

Description: The main objective behind this project is using speaker recognition for security purposes. By security we mean identification of the speaker and thus granting permission to access details of very high confidentiality
Platform: | Size: 87040 | Author: hari | Hits:

[Documents615498514

Description: 表面缺损检测对保证产品的使用性能、完整性和安全性具有重要意义 本文将表面 缺损类型总结为结构缺损、几何缺损、颜色缺损和纹理缺损等几类,并进行特征分析。在此基础上,从基于灰度特征、形态特征、色度特征和纹理特征等几方面对表面缺损的图像检测方法进行综-Surface defect detection products to ensure the use of performance, integrity and security will be of great significance to this article summed up the type of surface defect structure of defects, defect geometry, color and texture defects, such as several types of defects, and analysis. On this basis, from the gray-scale-based features, shape features, color features and texture features, such as several images of the surface defect detection method for fully mechanized
Platform: | Size: 391168 | Author: wangzhongmei | Hits:

[Otherpatternclassification(2ED)byDuda-Chineseversion-ad

Description: Duda 模式分类第二版-中文版,已去除文档安全限制并为每章加了书签,方便阅读-pattern classification- second edition by Duda- the Chinese version, has been removed for the document security restrictions and added bookmarks, convenient read
Platform: | Size: 16940032 | Author: 长立志 | Hits:

[Special EffectsSPG

Description: 希尔伯特黄变换方法的安全评估matlab源程序-Hilbert-Huang Transformation security assessment
Platform: | Size: 1024 | Author: dongwen | Hits:

[matlabNew-folder-(3)

Description: mobileipv6 for security
Platform: | Size: 396288 | Author: rajshree | Hits:

[Special Effectsemdwt

Description: 基于小波变换的扩频图象数字水印,将水印嵌入到小波中。以保证信息的安全-Spread spectrum based on wavelet transform image watermarking, the watermark is embedded into the wavelet. To ensure information security
Platform: | Size: 1024 | Author: lina | Hits:
« 12 3 4 5 »

CodeBus www.codebus.net